Hello, I installed an EMS server (6.4.3) for the customer. More or less everything works, but:
1) how to force FG (6.4.3) to see FortiClients connected to VPN? I have the EMS Fabric connector set up and working. In the SSL VPN Monitor I see a client connected, but FortiClient Monitor is empty. In the EMS Administration Guide I see:
FortiOS only receives endpoint information and enforces compliance for directly connected endpoints. Directly connected endpoints are the ones that have FortiGate as the default gateway.
So should I understand that if the FortiClient is not connected directly to any FG interface (and ssl.root is not a valid interface?), there is no chance that the FG will know about it? Shouldn't the EMS server send client information? I tried:
config system interfacebut
edit ssl.root
set allowaccess fabric
Must set ip as fabric is enabled. object set operator error, -118 discard the settingDo I understand correctly that it is necessary to set the IP address on the ssl.root interface?
Command fail. Return code 1
2) I am not able to synchronize dynamic groups between EMS and FG. On the EMS, the client is correctly tagged, the tag is transferred to the FG, but without an IP or MAC record. "Unresolved dynamic address: FCTEMSxxxxxxxx"
Thank you. Jirka
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
same issue, looks like the telemetry only works when the SSLVPN client is up, even though telemetry shows connected to the EMS without the SSLVPN.
I also find that it's a coin toss to whether I get the DHCP IP address given by the SSLVPN or the endpoint network interface handed off from a home router (192.169.x.x).
We are running 6.4.3 EMS, 6.4.1 FortiClient(its seems to work, as 6.4.3 was broken) and 6.4.4 FortiOS.
Has anyone figured out how to make these tags actually work, or is there a set of versions that work properly.
Working properly would be (to me)...
On SSLVPN or not, proper telemetry for the interface connected to telemetry (might be hardwired, might be WIFI), both the IP address and MAC address. When connected to SSLVPN, the IP address should be the IP address handed off by the SSL VPN
rm
sigmasoftcz wrote:In the EMS Administration Guide I see:
FortiOS only receives endpoint information and enforces compliance for directly connected endpoints. Directly connected endpoints are the ones that have FortiGate as the default gateway.
So should I understand that if the FortiClient is not connected directly to any FG interface (and ssl.root is not a valid interface?), there is no chance that the FG will know about it? Shouldn't the EMS server send client information? I
If I remember correctly I read that with the current versions the client no longer communicates directly with FGT, but all communication goes through EMS.
Yes, that is correct, the clients talk to EMS, EMS talks to FGT...after 6.2
The part about the FGT having to be the GW is a bit mysterious.
I have half of my endpoints showing up on the FGT in a tag (diag firewall dyn list) that have SSLVPN DHCP addresss (ie. they are connected via SSL VPN) and the other half are 'home' internet IP's (these are NOT connected via SSLVPN or by any other means have the FGT as a GW).
EMS clearly reports IP, MAC, Public IP...etc...for those endpoints that show up on FGT with 'home' ip address, none of these have anything to do with IP or MAC's from the FGT...yet they show up in the tag on the FGT...
It gets better...but in the wrong direction!
So, given that the tags in the FGT 'supposedly' only attract endpoints (IP/MAC addresses) that have the FGT as their gateway...that results in every single device that is logged into the VPN to have the exact same MAC address, yet different DHCP IP addresses.
It's as if the Firewall developers, don't talk to the VPN developers and neither of them talk to the FortiClient developers and the guys from the EMS development team live on Mars...what a disaster for a product that could be so cool...oh well, maybe it's just time to send it back since it clearly doesn't work.
All I want is to be able to identify specific endpoints in FGT policies so I can send them down different paths. To do that I'd have to create a tag for each endpoint, not an impossible job, but it sucks with a lot of endpoints.
Hi
I have the same issue using Forticlient EMS 6.4.3 and IPSec VPN. With the Windows endpoint the tags works fine, the FTG gets the tag and I can do the dynamic policy.
But with macOS (Catalina / Big Sur) not work, I can see the Tags on EMS Server but the EMS Server not send the tags info to FTG so when I check the dynamic address for macOS are empty.
Does anybody know what I missed?
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1709 | |
1093 | |
752 | |
446 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.